Click to jump to signature section
Source: BjLxqVU7m4.dll | ReversingLabs: Detection: 50% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 97.6% probability |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.7:49699 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.7:49700 version: TLS 1.2 |
Source: BjLxqVU7m4.dll | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: sdiagnhost.exe, 00000003.00000002.3101557902.000001DFF9150000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101796777.000001DFFA933000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101107214.00000264CA283000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3100928223.00000264CA250000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: sdiagnhost.exe, 00000003.00000002.3101557902.000001DFF9150000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101796777.000001DFFA933000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101107214.00000264CA283000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3100928223.00000264CA250000.00000004.00001000.00020000.00000000.sdmp |
Source: Joe Sandbox View | JA3 fingerprint: 72a589da586844d7f0818ce684948eea |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: unknown | TCP traffic detected without corresponding DNS query: 148.135.121.165 |
Source: global traffic | HTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165 |
Source: global traffic | HTTP traffic detected: GET /39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 HTTP/1.1Connection: Keep-AliveContent-Type: text/plainUser-Agent: HCMUS-CTF BotnetHost: 148.135.121.165 |
Source: sdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/ |
Source: sdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3 |
Source: sdiagnhost.exe, 00000003.00000003.1878209479.000001DFF9081000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.1877665240.000001DFF907F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876779159.00000264CA341000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1276315126.00000264CA33F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101780226.00000264CA342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac30u0 |
Source: sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac3e6p |
Source: sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165/r5J |
Source: sdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101489905.00000264CA2FE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://148.135.121.165:443/39ffc7e3-0abd-4695-9967-553cce533999/5b790c2e-bfea-406c-af40-edc931ddeac |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49700 |
Source: unknown | Network traffic detected: HTTP traffic on port 49699 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 49699 |
Source: unknown | Network traffic detected: HTTP traffic on port 49700 -> 443 |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.7:49699 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 148.135.121.165:443 -> 192.168.2.7:49700 version: TLS 1.2 |
Source: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000004.00000003.1292237579.000001E618988000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000004.00000002.1292570457.0000005A5A9E2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000000.00000002.2450460206.000000EE24142000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: 00000000.00000003.2450321100.0000020E89DFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000001DFF8EE75CD NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtUnmapViewOfSection,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect, | 3_2_000001DFF8EE75CD |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 5_2_00000264CA0E75CD NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtUnmapViewOfSection,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect, | 5_2_00000264CA0E75CD |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000001DFF8EE75CD | 3_2_000001DFF8EE75CD |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000001DFF8EE6DC5 | 3_2_000001DFF8EE6DC5 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000001DFF8EEA8C5 | 3_2_000001DFF8EEA8C5 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000001DFF8EE5ED1 | 3_2_000001DFF8EE5ED1 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000001DFF8EE7195 | 3_2_000001DFF8EE7195 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000001DFF8EE806D | 3_2_000001DFF8EE806D |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 3_2_000001DFFA9311C0 | 3_2_000001DFFA9311C0 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 5_2_00000264CA0E75CD | 5_2_00000264CA0E75CD |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 5_2_00000264CA0E6DC5 | 5_2_00000264CA0E6DC5 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 5_2_00000264CA0E806D | 5_2_00000264CA0E806D |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 5_2_00000264CA0E7195 | 5_2_00000264CA0E7195 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 5_2_00000264CA0E5ED1 | 5_2_00000264CA0E5ED1 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 5_2_00000264CA0EA8C5 | 5_2_00000264CA0EA8C5 |
Source: C:\Windows\System32\sdiagnhost.exe | Code function: 5_2_00000264CA2811C0 | 5_2_00000264CA2811C0 |
Source: 00000003.00000002.3100684042.000001DFF8EE0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000005.00000002.3100687201.00000264CA0E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000004.00000003.1292237579.000001E618988000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000004.00000002.1292570457.0000005A5A9E2000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000000.00000002.2450460206.000000EE24142000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: 00000000.00000003.2450321100.0000020E89DFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13 |
Source: classification engine | Classification label: mal72.evad.winDLL@12/0@0/1 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7356:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7472:120:WilError_03 |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7532:120:WilError_03 |
Source: BjLxqVU7m4.dll | Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: C:\Windows\System32\loaddll64.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 |
Source: BjLxqVU7m4.dll | ReversingLabs: Detection: 50% |
Source: unknown | Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll" | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | |
Source: C:\Windows\System32\sdiagnhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\sdiagnhost.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mscoree.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: msvcp140.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: vcruntime140.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: vcruntime140_1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: webio.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: BjLxqVU7m4.dll | Static PE information: Image base 0x180000000 > 0x60000000 |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: BjLxqVU7m4.dll | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Source: BjLxqVU7m4.dll | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb&& source: sdiagnhost.exe, 00000003.00000002.3101557902.000001DFF9150000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101796777.000001DFFA933000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101107214.00000264CA283000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3100928223.00000264CA250000.00000004.00001000.00020000.00000000.sdmp |
Source: | Binary string: F:\Code\ctf\catchme\source\httpshellcode\x64\Release\httpshellcode.pdb source: sdiagnhost.exe, 00000003.00000002.3101557902.000001DFF9150000.00000004.00001000.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101796777.000001DFFA933000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101107214.00000264CA283000.00000002.10000000.00040000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3100928223.00000264CA250000.00000004.00001000.00020000.00000000.sdmp |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata |
Source: BjLxqVU7m4.dll | Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata |
Source: C:\Windows\System32\rundll32.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe TID: 7352 | Thread sleep time: -120000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe TID: 7456 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe TID: 7424 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe TID: 7516 | Thread sleep time: -30000s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe TID: 7480 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\sdiagnhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: C:\Windows\System32\loaddll64.exe | Thread delayed: delay time: 120000 | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: sdiagnhost.exe, 00000003.00000003.1877851785.000001DFF9090000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.1878377128.000001DFF9090000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101155052.000001DFF9092000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW5OKT |
Source: sdiagnhost.exe, 00000005.00000003.1876714389.00000264CA2FD000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876957819.00000264CA310000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW ;4 |
Source: sdiagnhost.exe, 00000003.00000003.1877851785.000001DFF9090000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.1878124649.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000003.1878377128.000001DFF9090000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3101155052.000001DFF9092000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000003.00000002.3100846109.000001DFF903F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876571755.00000264CA34C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1876779159.00000264CA341000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1276315126.00000264CA34C000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000003.1276315126.00000264CA33F000.00000004.00000020.00020000.00000000.sdmp, sdiagnhost.exe, 00000005.00000002.3101780226.00000264CA342000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: C:\Windows\System32\loaddll64.exe | Memory allocated: C:\Windows\System32\sdiagnhost.exe base: 1DFF8EE0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Memory allocated: C:\Windows\System32\sdiagnhost.exe base: 264CA0E0000 protect: page execute and read and write | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Thread created: C:\Windows\System32\sdiagnhost.exe EIP: F8EE0000 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Thread created: C:\Windows\System32\sdiagnhost.exe EIP: CA0E0000 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Memory written: C:\Windows\System32\sdiagnhost.exe base: 1DFF8EE0000 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Memory written: C:\Windows\System32\sdiagnhost.exe base: 264CA0E0000 | Jump to behavior |
Source: C:\Windows\System32\loaddll64.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | Jump to behavior |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\BjLxqVU7m4.dll",#1 | Jump to behavior |
Source: C:\Windows\System32\rundll32.exe | Process created: C:\Windows\System32\sdiagnhost.exe c:\windows\System32\sdiagnhost.exe | Jump to behavior |
Source: C:\Windows\System32\sdiagnhost.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |